Advertisements
Advertisements
Question
Differentiate asymmetric and symmetric algorithms.
Distinguish Between
Solution
Symmetric Key Encryption | Asymmetric Key Encryption |
Same key is used for both encryption and decryption. | Different keys are used for encryption and decryption. |
Speed of encryption or decryption is very fast. | Speed of encryption or decryption is comparatively slow. |
Plain text and cipher text are of same size. | The size of cipher text is always greater than plain text. |
Algorithms like DES, AES, RC4 uses symmetric key encryption. | Algorithms like RSA, ECC, DSA use asymmetric key encryption. |
Provides confidentially. | Provides confidentially, authenticity and non-repudiation. |
The number of key used grows exponentially with the numbers of users. | The number of key used grows linearly with the numbers of users. |
![]() |
![]() |
shaalaa.com
Security Technologies in E-commerce Transaction
Is there an error in this question or solution?
APPEARS IN
RELATED QUESTIONS
The security authentication technology does not include ______.
- Digital Signatures
- Digital Time Stamps
- Digital Technology
- Digital Certificates
PGP stands for ______.
_____ protocol is used for securing credit cards transactions via the internet.
The websites secured by Secure Socket Layer protocols can be identified using ______.
List the different types of security technologies in E-Commerce.
Write about digital signature.
Explain 3D secure payment protocols.
Explain encryption technology.
Define Secure Electronic Transaction (SET).
Explain the features of Secure Electronic Transaction (SET).